Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2011:1386 - Security Advisory
Issued:
2011-10-20
Updated:
2011-10-20

RHSA-2011:1386 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix multiple security issues, several bugs,
and add one enhancement are now available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security fixes:

  • The maximum file offset handling for ext4 file systems could allow a

local, unprivileged user to cause a denial of service. (CVE-2011-2695,
Important)

  • IPv6 fragment identification value generation could allow a remote

attacker to disrupt a target system's networking, preventing legitimate
users from accessing its services. (CVE-2011-2699, Important)

  • A malicious CIFS (Common Internet File System) server could send a

specially-crafted response to a directory read request that would result in
a denial of service or privilege escalation on a system that has a CIFS
share mounted. (CVE-2011-3191, Important)

  • A local attacker could use mount.ecryptfs_private to mount (and then

access) a directory they would otherwise not have access to. Note: To
correct this issue, the RHSA-2011:1241 ecryptfs-utils update must also be
installed. (CVE-2011-1833, Moderate)

  • A flaw in the taskstats subsystem could allow a local, unprivileged user

to cause excessive CPU time and memory use. (CVE-2011-2484, Moderate)

  • Mapping expansion handling could allow a local, unprivileged user to

cause a denial of service. (CVE-2011-2496, Moderate)

  • GRO (Generic Receive Offload) fields could be left in an inconsistent

state. An attacker on the local network could use this flaw to cause a
denial of service. GRO is enabled by default in all network drivers that
support it. (CVE-2011-2723, Moderate)

  • RHSA-2011:1065 introduced a regression in the Ethernet bridge

implementation. If a system had an interface in a bridge, and an attacker
on the local network could send packets to that interface, they could cause
a denial of service on that system. Xen hypervisor and KVM (Kernel-based
Virtual Machine) hosts often deploy bridge interfaces. (CVE-2011-2942,
Moderate)

  • A flaw in the Xen hypervisor IOMMU error handling implementation could

allow a privileged guest user, within a guest operating system that has
direct control of a PCI device, to cause performance degradation on the
host and possibly cause it to hang. (CVE-2011-3131, Moderate)

  • IPv4 and IPv6 protocol sequence number and fragment ID generation could

allow a man-in-the-middle attacker to inject packets and possibly hijack
connections. Protocol sequence number and fragment IDs are now more random.
(CVE-2011-3188, Moderate)

  • A flaw in the kernel's clock implementation could allow a local,

unprivileged user to cause a denial of service. (CVE-2011-3209, Moderate)

  • Non-member VLAN (virtual LAN) packet handling for interfaces in

promiscuous mode and also using the be2net driver could allow an attacker
on the local network to cause a denial of service. (CVE-2011-3347,
Moderate)

  • A flaw in the auerswald USB driver could allow a local, unprivileged user

to cause a denial of service or escalate their privileges by inserting a
specially-crafted USB device. (CVE-2009-4067, Low)

  • A flaw in the Trusted Platform Module (TPM) implementation could allow a

local, unprivileged user to leak information to user space. (CVE-2011-1160,
Low)

  • A local, unprivileged user could possibly mount a CIFS share that

requires authentication without knowing the correct password if the mount
was already mounted by another local user. (CVE-2011-1585, Low)

Red Hat would like to thank Fernando Gont for reporting CVE-2011-2699;
Darren Lavender for reporting CVE-2011-3191; the Ubuntu Security Team for
reporting CVE-2011-1833; Vasiliy Kulikov of Openwall for reporting
CVE-2011-2484; Robert Swiecki for reporting CVE-2011-2496; Brent Meshier
for reporting CVE-2011-2723; Dan Kaminsky for reporting CVE-2011-3188;
Yasuaki Ishimatsu for reporting CVE-2011-3209; Somnath Kotur for reporting
CVE-2011-3347; Rafael Dominguez Vega for reporting CVE-2009-4067; and Peter
Huewe for reporting CVE-2011-1160. The Ubuntu Security Team acknowledges
Vasiliy Kulikov of Openwall and Dan Rosenberg as the original reporters of
CVE-2011-1833.

Solution

This update also fixes several bugs and adds one enhancement.
Documentation for these changes will be available shortly from the
Technical Notes document linked to in the References section.

Users should upgrade to these updated packages, which contain
backported patches to correct these issues, and fix the bugs and add
the enhancement noted in the Technical Notes. The system must be
rebooted for this update to take effect.

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 684671 - CVE-2011-1160 kernel: tpm infoleaks
  • BZ - 697394 - CVE-2011-1585 kernel: cifs session reuse
  • BZ - 715436 - CVE-2011-2484 kernel: taskstats: duplicate entries in listener mode can lead to DoS
  • BZ - 716538 - CVE-2011-2496 kernel: mm: avoid wrapping vm_pgoff in mremap() and stack expansions
  • BZ - 722393 - CVE-2009-4067 kernel: usb: buffer overflow in auerswald_probe()
  • BZ - 722557 - CVE-2011-2695 kernel: ext4: kernel panic when writing data to the last block of sparse file
  • BZ - 723429 - CVE-2011-2699 kernel: ipv6: make fragment identifications less predictable
  • BZ - 726552 - CVE-2011-2723 kernel: gro: only reset frag0 when skb can be pulled
  • BZ - 728518 - win2003 i386 guest BSOD when created with e1000 nic [rhel-5.7.z]
  • BZ - 730341 - CVE-2011-3131 kernel: xen: IOMMU fault livelock
  • BZ - 730682 - [EL5.7] igb: failed to activate WOL on 2nd LAN port on i350 [rhel-5.7.z]
  • BZ - 730686 - Huge performance regression in NFS client [rhel-5.7.z]
  • BZ - 730917 - CVE-2011-2942 kernel: bridge: null pointer dereference in __br_deliver
  • BZ - 731172 - CVE-2011-1833 kernel: ecryptfs: mount source TOCTOU race
  • BZ - 732658 - CVE-2011-3188 kernel: net: improve sequence number generation
  • BZ - 732869 - CVE-2011-3191 kernel: cifs: signedness issue in CIFSFindNext()
  • BZ - 732878 - CVE-2011-3209 kernel: panic occurs when clock_gettime() is called
  • BZ - 733665 - Incorrect values in /proc/sys/vm/dirty_writeback_centises and dirty_expire_centisecs [rhel-5.7.z]
  • BZ - 736425 - CVE-2011-3347 kernel: be2net: promiscuous mode and non-member VLAN packets DoS
  • BZ - 738389 - Patch needed to allow MTU >1500 on vif prior to connecting to bridge [rhel-5.7.z]
  • BZ - 738392 - netfront MTU drops to 1500 after domain migration [rhel-5.7.z]
  • BZ - 739823 - 2.6.18-238.1.1.el5 or newer won't boot under Xen HVM due to linux-2.6-virt-nmi-don-t-print-nmi-stuck-messages-on-guests.patch [rhel-5.7.z]

CVEs

  • CVE-2011-2695
  • CVE-2011-1160
  • CVE-2011-2496
  • CVE-2011-2484
  • CVE-2011-1585
  • CVE-2011-2723
  • CVE-2011-1833
  • CVE-2011-3188
  • CVE-2011-2942
  • CVE-2011-2699
  • CVE-2009-4067
  • CVE-2011-3347
  • CVE-2011-3209
  • CVE-2011-3191
  • CVE-2011-3131

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kernel.html#RHSA-2011-1386
  • https://rhn.redhat.com/errata/RHSA-2011-1241.html
  • https://rhn.redhat.com/errata/RHSA-2011-1065.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
kernel-2.6.18-274.7.1.el5.src.rpm SHA-256: 470163d196129a77aa08fd26584998d7e6acb48fdc8b2bd124f4ce244f5e332a
x86_64
kernel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 4feb5b876b4fa895eb96654d5013a930d90f1c01b873094d383e43f06cfae320
kernel-debug-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 47c522b5ecc0fccae5c96523d86a0ea7f75bc1356e8136471d73a6a9ca225076
kernel-debug-devel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 245e08e4c5937475f020360bf0b8b58e8324d71515785d1f5cbeb031de53b742
kernel-devel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 971aa88a05ed622c2b90d4699b579b69c7fe6ba3664596554140da1dbb5dd709
kernel-doc-2.6.18-274.7.1.el5.noarch.rpm SHA-256: b110dd4b66c8bfb66eb85132197055485f5f3d1a282d5586b68dd8aee0f5326b
kernel-headers-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 535abfc16dea382ac055d82d76367077613858f89db85903979e9090d9303a21
kernel-xen-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: e81d008f727a54853ab7ce2d65eac13a8a4951a96993464e7a6bd56a4e02e143
kernel-xen-devel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 4be5df0cce362513ba96cb9ee90a44e16b7de3c991804d628375aff3cc3efc45
ia64
kernel-2.6.18-274.7.1.el5.ia64.rpm SHA-256: 19b556d8974e2a2e26ee6a70fa19a45f22f618e994649f8c996ddbae6d5cc60c
kernel-debug-2.6.18-274.7.1.el5.ia64.rpm SHA-256: faba358f4aea9c41ff380dc88a44a005927980dceeb3d940fdb1fac1f5147760
kernel-debug-devel-2.6.18-274.7.1.el5.ia64.rpm SHA-256: 4f310ddb97d2e5ac10e1f0063aa49ece1dd8ca45dc8d27b91dbf0cfc02c68228
kernel-devel-2.6.18-274.7.1.el5.ia64.rpm SHA-256: b32af30cac7b9952856130fe26193a6fcbbf90a308f623b3c5b483d2dfe62a0a
kernel-doc-2.6.18-274.7.1.el5.noarch.rpm SHA-256: b110dd4b66c8bfb66eb85132197055485f5f3d1a282d5586b68dd8aee0f5326b
kernel-headers-2.6.18-274.7.1.el5.ia64.rpm SHA-256: d3969ca5f7e7b31d992d5deeb45707c5020d8e67a51c4092cde0644d83f44343
kernel-xen-2.6.18-274.7.1.el5.ia64.rpm SHA-256: e93ac276eb03465cff561f78a7e4f921ae823e322fd0627a7e56d14773374cf5
kernel-xen-devel-2.6.18-274.7.1.el5.ia64.rpm SHA-256: 2474fc1aea84cab0c3b2b7ec31ab20ba8b1df8de0b6df5f910aac24a1a65982d
i386
kernel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 9ca89c8550188daf2c14d729b3ba9d575c04f9eed3a06a99754aef440d1c1d9d
kernel-PAE-2.6.18-274.7.1.el5.i686.rpm SHA-256: d917c232c6815b6f6e7aefacb07a1761f8fd332392802b62d6a687f2d344d72b
kernel-PAE-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: ba59dad5e5d50e522a1c05bb06bca110cd855f6235a64f7e6bb19a33d4014790
kernel-debug-2.6.18-274.7.1.el5.i686.rpm SHA-256: 6735276d6348d94cad3b90f736d0c6306a053b692482d5649369b305aed33672
kernel-debug-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 1867b0a8401a43c0e5aeb933ccb3478160868dd32805adfd02fd05c46bc33088
kernel-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 356805f1368ab609ea248afd5aa96069f8fb68f59efdecc495f7f538fd87bc79
kernel-doc-2.6.18-274.7.1.el5.noarch.rpm SHA-256: b110dd4b66c8bfb66eb85132197055485f5f3d1a282d5586b68dd8aee0f5326b
kernel-headers-2.6.18-274.7.1.el5.i386.rpm SHA-256: 21c5986d84fed5eda9a702c55705f35decd85988c9ff159ff482c25484118558
kernel-xen-2.6.18-274.7.1.el5.i686.rpm SHA-256: c5cb4bb35b0972447701bca7bff4075188f7946df97c9e3b314098e79dc5dc08
kernel-xen-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 51e1b03e55cffd8e292b9c63063981c51dd82615e0b1cb51950d20b7b9e582f7

Red Hat Enterprise Linux Workstation 5

SRPM
kernel-2.6.18-274.7.1.el5.src.rpm SHA-256: 470163d196129a77aa08fd26584998d7e6acb48fdc8b2bd124f4ce244f5e332a
x86_64
kernel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 4feb5b876b4fa895eb96654d5013a930d90f1c01b873094d383e43f06cfae320
kernel-debug-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 47c522b5ecc0fccae5c96523d86a0ea7f75bc1356e8136471d73a6a9ca225076
kernel-debug-devel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 245e08e4c5937475f020360bf0b8b58e8324d71515785d1f5cbeb031de53b742
kernel-devel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 971aa88a05ed622c2b90d4699b579b69c7fe6ba3664596554140da1dbb5dd709
kernel-doc-2.6.18-274.7.1.el5.noarch.rpm SHA-256: b110dd4b66c8bfb66eb85132197055485f5f3d1a282d5586b68dd8aee0f5326b
kernel-headers-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 535abfc16dea382ac055d82d76367077613858f89db85903979e9090d9303a21
kernel-xen-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: e81d008f727a54853ab7ce2d65eac13a8a4951a96993464e7a6bd56a4e02e143
kernel-xen-devel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 4be5df0cce362513ba96cb9ee90a44e16b7de3c991804d628375aff3cc3efc45
i386
kernel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 9ca89c8550188daf2c14d729b3ba9d575c04f9eed3a06a99754aef440d1c1d9d
kernel-PAE-2.6.18-274.7.1.el5.i686.rpm SHA-256: d917c232c6815b6f6e7aefacb07a1761f8fd332392802b62d6a687f2d344d72b
kernel-PAE-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: ba59dad5e5d50e522a1c05bb06bca110cd855f6235a64f7e6bb19a33d4014790
kernel-debug-2.6.18-274.7.1.el5.i686.rpm SHA-256: 6735276d6348d94cad3b90f736d0c6306a053b692482d5649369b305aed33672
kernel-debug-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 1867b0a8401a43c0e5aeb933ccb3478160868dd32805adfd02fd05c46bc33088
kernel-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 356805f1368ab609ea248afd5aa96069f8fb68f59efdecc495f7f538fd87bc79
kernel-doc-2.6.18-274.7.1.el5.noarch.rpm SHA-256: b110dd4b66c8bfb66eb85132197055485f5f3d1a282d5586b68dd8aee0f5326b
kernel-headers-2.6.18-274.7.1.el5.i386.rpm SHA-256: 21c5986d84fed5eda9a702c55705f35decd85988c9ff159ff482c25484118558
kernel-xen-2.6.18-274.7.1.el5.i686.rpm SHA-256: c5cb4bb35b0972447701bca7bff4075188f7946df97c9e3b314098e79dc5dc08
kernel-xen-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 51e1b03e55cffd8e292b9c63063981c51dd82615e0b1cb51950d20b7b9e582f7

Red Hat Enterprise Linux Desktop 5

SRPM
kernel-2.6.18-274.7.1.el5.src.rpm SHA-256: 470163d196129a77aa08fd26584998d7e6acb48fdc8b2bd124f4ce244f5e332a
x86_64
kernel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 4feb5b876b4fa895eb96654d5013a930d90f1c01b873094d383e43f06cfae320
kernel-debug-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 47c522b5ecc0fccae5c96523d86a0ea7f75bc1356e8136471d73a6a9ca225076
kernel-debug-devel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 245e08e4c5937475f020360bf0b8b58e8324d71515785d1f5cbeb031de53b742
kernel-devel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 971aa88a05ed622c2b90d4699b579b69c7fe6ba3664596554140da1dbb5dd709
kernel-doc-2.6.18-274.7.1.el5.noarch.rpm SHA-256: b110dd4b66c8bfb66eb85132197055485f5f3d1a282d5586b68dd8aee0f5326b
kernel-headers-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 535abfc16dea382ac055d82d76367077613858f89db85903979e9090d9303a21
kernel-xen-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: e81d008f727a54853ab7ce2d65eac13a8a4951a96993464e7a6bd56a4e02e143
kernel-xen-devel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 4be5df0cce362513ba96cb9ee90a44e16b7de3c991804d628375aff3cc3efc45
i386
kernel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 9ca89c8550188daf2c14d729b3ba9d575c04f9eed3a06a99754aef440d1c1d9d
kernel-PAE-2.6.18-274.7.1.el5.i686.rpm SHA-256: d917c232c6815b6f6e7aefacb07a1761f8fd332392802b62d6a687f2d344d72b
kernel-PAE-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: ba59dad5e5d50e522a1c05bb06bca110cd855f6235a64f7e6bb19a33d4014790
kernel-debug-2.6.18-274.7.1.el5.i686.rpm SHA-256: 6735276d6348d94cad3b90f736d0c6306a053b692482d5649369b305aed33672
kernel-debug-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 1867b0a8401a43c0e5aeb933ccb3478160868dd32805adfd02fd05c46bc33088
kernel-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 356805f1368ab609ea248afd5aa96069f8fb68f59efdecc495f7f538fd87bc79
kernel-doc-2.6.18-274.7.1.el5.noarch.rpm SHA-256: b110dd4b66c8bfb66eb85132197055485f5f3d1a282d5586b68dd8aee0f5326b
kernel-headers-2.6.18-274.7.1.el5.i386.rpm SHA-256: 21c5986d84fed5eda9a702c55705f35decd85988c9ff159ff482c25484118558
kernel-xen-2.6.18-274.7.1.el5.i686.rpm SHA-256: c5cb4bb35b0972447701bca7bff4075188f7946df97c9e3b314098e79dc5dc08
kernel-xen-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 51e1b03e55cffd8e292b9c63063981c51dd82615e0b1cb51950d20b7b9e582f7

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
kernel-2.6.18-274.7.1.el5.src.rpm SHA-256: 470163d196129a77aa08fd26584998d7e6acb48fdc8b2bd124f4ce244f5e332a
s390x
kernel-2.6.18-274.7.1.el5.s390x.rpm SHA-256: 55e2ee5ecadd1e4964a5607a16a1138162fbfe25f353052820020daaa3b4d533
kernel-debug-2.6.18-274.7.1.el5.s390x.rpm SHA-256: 533d0ea9969e57997a337e9e6d0f88059689b0f02f43ef5b426559a46a10a882
kernel-debug-devel-2.6.18-274.7.1.el5.s390x.rpm SHA-256: 58056ee59d634f0e2bec36965460da9eefaeb9302ae098362abc0f1d2a4c00de
kernel-devel-2.6.18-274.7.1.el5.s390x.rpm SHA-256: 5bfdc25832def3839bab460e83da0df4bc05d724e864aa3b0b46fe2a9816e37f
kernel-doc-2.6.18-274.7.1.el5.noarch.rpm SHA-256: b110dd4b66c8bfb66eb85132197055485f5f3d1a282d5586b68dd8aee0f5326b
kernel-headers-2.6.18-274.7.1.el5.s390x.rpm SHA-256: 0d4856f63e04f3f0fa44eaaabb4f62fd2c1667bbf5488379d1079e6fc8baa432
kernel-kdump-2.6.18-274.7.1.el5.s390x.rpm SHA-256: 9653ab1d7c4a2d5fa3991bcbf25e5b32098783dbe98e4fea5a7016dafe0132ac
kernel-kdump-devel-2.6.18-274.7.1.el5.s390x.rpm SHA-256: 33e3ba6add32ac1158fda758bc126f8f6ff6def0f4caf8be3920611c4bc5f4e9

Red Hat Enterprise Linux for Power, big endian 5

SRPM
kernel-2.6.18-274.7.1.el5.src.rpm SHA-256: 470163d196129a77aa08fd26584998d7e6acb48fdc8b2bd124f4ce244f5e332a
ppc
kernel-2.6.18-274.7.1.el5.ppc64.rpm SHA-256: 5d8addf15ecff25975f423569fb135effdf65d9b6df7ab7155c920533fbfe763
kernel-debug-2.6.18-274.7.1.el5.ppc64.rpm SHA-256: 46cc6854c006cd6fa04a67bc13c392ab35504b0d7fe3fa21ec7673a8e1aebe6d
kernel-debug-devel-2.6.18-274.7.1.el5.ppc64.rpm SHA-256: 8e67b3d78a0f97ad4e09de30a70eaf904a92631f076ee4f9b4efd8266bb2f4d2
kernel-devel-2.6.18-274.7.1.el5.ppc64.rpm SHA-256: 9174ef86e0925d9ae9f6356b5c50ee551b44e6a9a7c74c5432b84f37df970275
kernel-doc-2.6.18-274.7.1.el5.noarch.rpm SHA-256: b110dd4b66c8bfb66eb85132197055485f5f3d1a282d5586b68dd8aee0f5326b
kernel-headers-2.6.18-274.7.1.el5.ppc.rpm SHA-256: e5e60a35fdae5589be7d7ab507ee2f57c891079c93080b5272b070f63936384f
kernel-headers-2.6.18-274.7.1.el5.ppc64.rpm SHA-256: bddf464b4ea0f347260625a1dd76c5e30d3f1a342ee6e89092a57c64fe903419
kernel-kdump-2.6.18-274.7.1.el5.ppc64.rpm SHA-256: a52c370f8bd6bbcddf7a4718a4ffd9004e96fc165708a2cc4e2e262c15c7bc42
kernel-kdump-devel-2.6.18-274.7.1.el5.ppc64.rpm SHA-256: ce0eab591d36d772805e4b46408d78a06961d76b671f8d543bbac4bf7a1bbc49

Red Hat Enterprise Linux Server from RHUI 5

SRPM
kernel-2.6.18-274.7.1.el5.src.rpm SHA-256: 470163d196129a77aa08fd26584998d7e6acb48fdc8b2bd124f4ce244f5e332a
x86_64
kernel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 4feb5b876b4fa895eb96654d5013a930d90f1c01b873094d383e43f06cfae320
kernel-debug-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 47c522b5ecc0fccae5c96523d86a0ea7f75bc1356e8136471d73a6a9ca225076
kernel-debug-devel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 245e08e4c5937475f020360bf0b8b58e8324d71515785d1f5cbeb031de53b742
kernel-devel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 971aa88a05ed622c2b90d4699b579b69c7fe6ba3664596554140da1dbb5dd709
kernel-doc-2.6.18-274.7.1.el5.noarch.rpm SHA-256: b110dd4b66c8bfb66eb85132197055485f5f3d1a282d5586b68dd8aee0f5326b
kernel-headers-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 535abfc16dea382ac055d82d76367077613858f89db85903979e9090d9303a21
kernel-xen-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: e81d008f727a54853ab7ce2d65eac13a8a4951a96993464e7a6bd56a4e02e143
kernel-xen-devel-2.6.18-274.7.1.el5.x86_64.rpm SHA-256: 4be5df0cce362513ba96cb9ee90a44e16b7de3c991804d628375aff3cc3efc45
i386
kernel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 9ca89c8550188daf2c14d729b3ba9d575c04f9eed3a06a99754aef440d1c1d9d
kernel-PAE-2.6.18-274.7.1.el5.i686.rpm SHA-256: d917c232c6815b6f6e7aefacb07a1761f8fd332392802b62d6a687f2d344d72b
kernel-PAE-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: ba59dad5e5d50e522a1c05bb06bca110cd855f6235a64f7e6bb19a33d4014790
kernel-debug-2.6.18-274.7.1.el5.i686.rpm SHA-256: 6735276d6348d94cad3b90f736d0c6306a053b692482d5649369b305aed33672
kernel-debug-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 1867b0a8401a43c0e5aeb933ccb3478160868dd32805adfd02fd05c46bc33088
kernel-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 356805f1368ab609ea248afd5aa96069f8fb68f59efdecc495f7f538fd87bc79
kernel-doc-2.6.18-274.7.1.el5.noarch.rpm SHA-256: b110dd4b66c8bfb66eb85132197055485f5f3d1a282d5586b68dd8aee0f5326b
kernel-headers-2.6.18-274.7.1.el5.i386.rpm SHA-256: 21c5986d84fed5eda9a702c55705f35decd85988c9ff159ff482c25484118558
kernel-xen-2.6.18-274.7.1.el5.i686.rpm SHA-256: c5cb4bb35b0972447701bca7bff4075188f7946df97c9e3b314098e79dc5dc08
kernel-xen-devel-2.6.18-274.7.1.el5.i686.rpm SHA-256: 51e1b03e55cffd8e292b9c63063981c51dd82615e0b1cb51950d20b7b9e582f7

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter